Use secure methods to boot a system and verify the integrity of the operating system and loading mechanisms. This can be accomplished with a Trusted Platform Module (TPM), which is a specialized chip on an endpoint device that stores specific encryption keys.
Discard any attack targeting one of your Assets that isn’t a Personnel or Service Provider. Gain 1 point and discard this card at the end of the round.
The CIAS was established at UT San Antonio in June of 2001 as part of UT San Antonio’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.